How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners
نویسندگان
چکیده
Most Secure Development Software Life Cycles (SSDLCs) start from security requirements. Security Management standards do likewise. There are several methods from industry and academia to elicit and analyze security requirements, but there are few empirical evaluations to investigate whether these methods are effective in identifying security requirements. Most of the papers published in the requirements engineering community report on methods’evaluations that are conducted by the same researchers who have designed the methods. The goal of this paper is to investigate how successfull academic security requirements methods are when applied by someone different than the method designer. The paper reports on a medium scale qualitative study where master students in computer science and professionals have applied academic security requirements engineering methods to analyze the security risks of a specific application scenario. The study has allowed the identification of methods’ strenghts and limitations.
منابع مشابه
A Comparative Study of Security Council's Dual Standards toward Recent Developments in Libya and Bahrain
With international peace and security covering a broader concept and restriction of governments' authority, issues such as human rights have become intertwined with international peace and security and are no longer an internal issue of governments. It is such that international society may react toward it and make some decisions. What seems important is how Security Council deals with such iss...
متن کاملHow Students’ Views on Educational Factors Influence Their Achievement Motivation and Learning Approaches? Comparison of Perspectives
This comparative study was conducted to explore achievement motivation and learning approaches of agricultural students and to examine students’ views on educational factors influencing their achievement motivation and learning approaches. The statistical population of this study comprised agricultural students of Tehran University (Tehran, Iran) and Ghent University (Belgium). A sample of 89 a...
متن کاملEmpirical Validation of Security Methods
Security requirements engineering is an important part of many software projects. Practitioners consider security requirements from the early stages of software development processes, but most of them do not use any formal method for security requirements engineering. According to a recent survey, only about 9% security practitioners implement formal process of elicitation and analysis of secur...
متن کاملThe study of General practitioners’ views on the content of composed programs in Zahedan
Introduction. Continuous education is an undeniable necessity. Nowadays, because of rapid advance of sciences, the importance of updating graduates knowledge is obvious to everyone. The present research aims at collecting general practitioners’ views about the content of composed programs in the city of Zahedan. Methods. The present descriptive study was performed using questionnaires includin...
متن کاملA Comparative Study of Emergency Nursing MSc Curriculum in Iran and the USA
Introduction: Conducting comparative studies is one of the research methods for revising and modernizing educational programs. The aim of this study was to compare the emergency nursing MSc curriculum in Iran and the USA. Methods: This descriptive-comparative study was conducted in 2018 at Tabriz University of Medical Sciences. Vanderbilt University was selected through internet searches due to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012